Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4.15 allows an attacker to control the target host by calling any function in leadshop.php via the GET method.
References
Link | Resource |
---|---|
https://github.com/qmpaas/leadshop/commit/f27e9ca5c93eaadda1097396b65c234b16186d67 | Patch Third Party Advisory |
https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3 | Exploit Patch Third Party Advisory |
https://github.com/qmpaas/leadshop/commit/f27e9ca5c93eaadda1097396b65c234b16186d67 | Patch Third Party Advisory |
https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/qmpaas/leadshop/commit/f27e9ca5c93eaadda1097396b65c234b16186d67 - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3 - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-11-24 08:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4136
Mitre link : CVE-2022-4136
CVE.ORG link : CVE-2022-4136
JSON object : View
Products Affected
leadshop
- leadshop
CWE